Skip to content

Commit d9e5b1e

Browse files
1 parent 7222f32 commit d9e5b1e

File tree

2 files changed

+108
-7
lines changed

2 files changed

+108
-7
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-h8cp-697h-8c8p",
4+
"modified": "2025-12-03T17:00:03Z",
5+
"published": "2025-12-03T17:00:03Z",
6+
"aliases": [
7+
"CVE-2025-44005"
8+
],
9+
"summary": "Step CA Has Authorization Bypass in ACME and SCEP Provisioners",
10+
"details": "## Summary\n\nA security fix is now available for Step CA that resolves a vulnerability affecting deployments configured with ACME and/or SCEP provisioners.\nAll operators running these provisioners should upgrade to the latest release (`v0.29.0`) immediately.\n\nThe issue was discovered and disclosed by a research team during a security review. There is no evidence of active exploitation.\n\nTo limit exploitation risk during a coordinated disclosure window, we are withholding detailed technical information for now. A full write-up will be published in several weeks.\n\n---\n\n## Embargo List\n\nIf your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.\n\n---\n\n## Acknowledgements\n\nThis issue was identified and reported by Stephen Kubik of the Cisco Advanced Security Initiatives Group (ASIG)\n\n---\n\nStay safe, and thank you for helping us keep the ecosystem secure.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/smallstep/certificates"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.29.0"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 0.28.4"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/smallstep/certificates/security/advisories/GHSA-h8cp-697h-8c8p"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/smallstep/certificates/commit/1011f5f5408b470a636f583bf74c0d7bbaf75d72"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/smallstep/certificates"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-306"
58+
],
59+
"severity": "CRITICAL",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-12-03T17:00:03Z",
62+
"nvd_published_at": null
63+
}
64+
}

advisories/unreviewed/2025/12/GHSA-mcxq-54f4-mmx5/GHSA-mcxq-54f4-mmx5.json renamed to advisories/github-reviewed/2025/12/GHSA-mcxq-54f4-mmx5/GHSA-mcxq-54f4-mmx5.json

Lines changed: 44 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,44 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mcxq-54f4-mmx5",
4-
"modified": "2025-12-02T21:31:31Z",
4+
"modified": "2025-12-03T16:59:21Z",
55
"published": "2025-12-02T21:31:31Z",
66
"aliases": [
77
"CVE-2025-65657"
88
],
9+
"summary": "FeehiCMS Has a Remote Code Execution via Unrestricted File Upload in Ad Management",
910
"details": "FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).",
10-
"severity": [],
11-
"affected": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "feehi/cms"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "2.1.1"
36+
}
37+
]
38+
}
39+
]
40+
}
41+
],
1242
"references": [
1343
{
1444
"type": "ADVISORY",
@@ -21,13 +51,20 @@
2151
{
2252
"type": "WEB",
2353
"url": "https://github.com/kiwi865/CVEs/blob/main/CVE-2025-65657.md"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/liufee/cms"
2458
}
2559
],
2660
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
29-
"github_reviewed": false,
30-
"github_reviewed_at": null,
61+
"cwe_ids": [
62+
"CWE-20",
63+
"CWE-77"
64+
],
65+
"severity": "MODERATE",
66+
"github_reviewed": true,
67+
"github_reviewed_at": "2025-12-03T16:59:21Z",
3168
"nvd_published_at": "2025-12-02T21:15:53Z"
3269
}
3370
}

0 commit comments

Comments
 (0)